CVE-2025-54395

6.1 MEDIUM

📋 TL;DR

Netwrix Directory Manager (formerly Imanami GroupID) versions 11.0.0.0 through 11.1.25162.01 contain a cross-site scripting (XSS) vulnerability in authentication configuration data. This allows attackers to inject malicious scripts that execute in users' browsers when viewing configuration pages. Organizations using vulnerable versions of this identity management software are affected.

💻 Affected Systems

Products:
  • Netwrix Directory Manager (formerly Imanami GroupID)
Versions: 11.0.0.0 through 11.1.25162.01
Operating Systems: Windows Server (typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web interface where authentication configuration data is displayed. Requires access to the Directory Manager interface, typically by authenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies or credentials, potentially gaining administrative access to the Directory Manager, leading to privilege escalation and unauthorized identity management operations.

🟠

Likely Case

Attackers could perform session hijacking against administrators, leading to unauthorized access to the Directory Manager interface and potential manipulation of user accounts or group memberships.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized, preventing execution in user browsers.

🌐 Internet-Facing: MEDIUM - If the Directory Manager web interface is exposed to the internet, attackers could exploit this without internal network access, though authentication is typically required.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts could exploit this vulnerability to escalate privileges within the identity management system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires the ability to modify authentication configuration data (typically requiring administrative access) and for victims to view the affected configuration pages. The vulnerability is in how this data is displayed without proper sanitization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.1.25162.02

Vendor Advisory: https://community.netwrix.com/t/adv-2025-015-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/17192

Restart Required: No

Instructions:

1. Download version 11.1.25162.02 or later from Netwrix support portal. 2. Run the installer on the Directory Manager server. 3. Follow the upgrade wizard. 4. Verify the version after completion.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation on authentication configuration fields to reject or sanitize script tags and JavaScript content.

Not applicable - requires code changes

Output Encoding

all

Apply proper HTML encoding to all user-controlled data displayed in the authentication configuration pages.

Not applicable - requires code changes

🧯 If You Can't Patch

  • Restrict access to Directory Manager web interface to only trusted administrators using network segmentation and firewall rules.
  • Implement Content Security Policy (CSP) headers to restrict script execution from untrusted sources in the Directory Manager interface.

🔍 How to Verify

Check if Vulnerable:

Check the Directory Manager version in the web interface under Help > About or via the installed programs list in Windows Control Panel.

Check Version:

Not applicable - check via web interface or Windows Programs and Features

Verify Fix Applied:

Verify the version is 11.1.25162.02 or later. Test by attempting to inject basic XSS payloads into authentication configuration fields and verifying they are properly sanitized when displayed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to authentication configuration settings
  • Multiple failed login attempts followed by configuration changes
  • Administrative sessions from unexpected IP addresses

Network Indicators:

  • HTTP requests containing script tags or JavaScript in authentication configuration parameters
  • Unusual traffic patterns to Directory Manager web interface

SIEM Query:

source="netwrix-directory-manager" AND (event_type="config_change" AND config_field="authentication" AND (value CONTAINS "<script>" OR value CONTAINS "javascript:"))

🔗 References

📤 Share & Export